During the last few years, we have witnessed an increase in advanced cyber attacks. Cybercriminals utilize the advanced technology to breach the digital boundary and exploit enterprises’ security vulnerabilities. No industry feels secure; security professionals do their utmost to close…
Latest posts - Page 44
Cisco Hacked By Yanluowang Ransomware Gang, 2.8GB Allegedly Stolen
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried to extort them under the threat of leaking stolen files online. The company revealed that the attackers could only harvest…
Best Woocomerce Fraud Prevention Plugin
Online shopping is becoming more popular every year. Revenue from retail e-commerce in the United States was estimated at roughly 768 billion U.S. dollars in 2021. The Statista Digital Market Outlook forecasts that by 2025, online shopping revenue in the…
Sites That Leak Ransomware Encourage More Attacks
Victims Are Frequently Attacked at the Same Time by Several Ransomware Groups Being posted on a ransomware leak website isn’t just embarrassing; it could also open you vulnerable to a follow-up attack from other ransomware gangs that believe the original…
Tornado Cash, A Virtual Currency Platform, is Charged With Supporting APTs
The virtual currency mixer was shut down by the U.S. Treasury for laundering more than $7 billion for hackers, including $455 million for the North Korean missile programme. For laundering more than $7 billion in cryptocurrency obtained through cybercrime, the…
Windows And UnRAR Weaknesses Are Being Actively Used In The Field, According To CISA
Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its list of known exploited vulnerabilities. One of these has been a zero-day defect in the Windows Support Diagnostic…
Cyberattack Affects The NHS 111 Emergency Line in the UK
Due to a recent significant cyber assault, a critical system used in the UK for the distribution of emergency drugs and ambulance transportation has been compromised. Customers of the National Health Service (NHS) 111 service have been informed that there…
The New Orchard Botnet Creates Malicious Domains Using Information from the Bitcoin Founder’s Account
A new botnet known as Orchard has been seen creating domain names to hide its command-and-control (C2) infrastructure using Satoshi Nakamoto’s account transaction data. According to researchers from Qihoo 360’s Netlab security team, “because of the uncertainty of Bitcoin transactions,…
Twilio Was Compromised By A Phishing Scheme That Targeted Online Businesses
The world’s largest provider of communications services, Twilio, has revealed that hackers were successful in obtaining employee login information to access client data. The San Francisco-based business, which enables customers to integrate phone and SMS features like two-factor authentication (2FA)…
Are You a Cyber-Resilient Government Organization?
Being ready for technological and commercial changes in the 2020s means what exactly? How can your company recover quickly? A change in the standard definitions of cybersecurity best practices began a few years ago. When defending against “cyber dangers,” terminology…